1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Natalija [7]
1 year ago
9

What option in the zone aging/scavenging properties dialog box will prevent dns record time stamps from being updated too often?

Computers and Technology
2 answers:
Maksim231197 [3]1 year ago
8 0

A timestamp is sent to each record that a DNS client creates. The most frequent reason for DNS records disappearing from DNS zones is scavenging.

<h3>What is a timestamp in a DNS record?</h3>

A timestamp is sent to each record that a DNS client creates. Every 24 hours, the DNS client tries to update this record. The timestamp is locked for default of seven days and cannot be renewed until the record is altered (for instance, the client gets a new IP address).

Resource records are the official term for DNS (domain name system) records. Furthermore, we classify them as DNS query types on the BlueCat platform. Both of these names are used equally. Approximately 90 different forms of official resource records exist.

The most frequent reason for DNS records disappearing from DNS zones is scavenging. Every 24 hours, records on Windows-based systems with statically allocated servers are registered. Check to see if the No Refresh and Refresh intervals are inadequate.

Therefore, the correct answer is option c. No-refresh interval

The complete question is:

What option in the Zone Aging/Scavenging Properties dialog box will prevent DNS record time stamps from being updated too often?

a. The zone can be scavenged after

b. Scavenge stale resource records

c. No-refresh interval

d. Refresh interval

To learn more about DNS records refer to:

brainly.com/question/9686093

#SPJ4

professor190 [17]1 year ago
5 0

Answer:

The statement is true

Explanation:

You might be interested in
Based on the following quote from Leonardo Da Vinci, what would be his definition of a fine artist? “Principles for the Developm
zvonat [6]

Answer:

A fine artist is one who sees the things other don't see and make connections other don't make.

7 0
2 years ago
Read 2 more answers
What is the location used by users to configure delegate access on their own mailboxes?
NeX [460]
Inbox? I think if wrong sorry
3 0
3 years ago
Read 2 more answers
How will you identify a file type on your computer?
Andru [333]

You use the extension on the end of the file to tell you the type of a file

The extension is the .whatever in the name of the file

5 0
2 years ago
If you get musicilly can your parents see
Tresset [83]
I wouldn't think so unless they have access to your phone or account. But I don't believe this is school related.
6 0
3 years ago
Read 2 more answers
Problem 1 (Authentication): Consider the following authentication protocol, which uses a classical cryptosystem. Alice generates
Elis [28]

Answer:

Check the explanation

Explanation:

Yes, going by the question above, the protocol validates Bob to Alice for the reason that the key is only shared between Bob and Alice as well as the number which is being sent randomly. Therefore the invader won’t be able to predict and response to that number. Because of the authentication protocol, that makes use of a classical cryptosystem thereby resulting into the possibility of an argument such that key finding is attainable via invader.

5 0
3 years ago
Other questions:
  • The spreadsheet below shows the names years in office, and number of terms for five US presidents
    7·2 answers
  • Explain how the principles underlying agile methods lead to accelerated development and deployment of software.
    6·1 answer
  • A(n) ____________________ or cryptosystem is an encryption method or process encompassing the algorithm, key(s) or cryptovariabl
    11·1 answer
  • What is the role of programmers in an organization?
    6·1 answer
  • (20 POINTS AND BAINLIEST)
    9·1 answer
  • Determine whether the phrase below is a sentence or a fragment.
    12·1 answer
  • What is the easiest way to deploy a C++ program to a user’s computer? a. Copy the source code to the user’s computer and then co
    13·1 answer
  • 11. Its collection of toys which could be used in the game via an implanted RFID chip made Activision’s game _______ one of the
    7·2 answers
  • How do you stop getting emails from brainly saying "sarah from brainly has answered your question"
    10·1 answer
  • I need help with my work
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!